Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 20:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.10203.xls
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.10203.xls
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.10203.xls
-
Size
308KB
-
MD5
ad17abb0af05e823197e08b483a27af7
-
SHA1
0636bcb12bf307d0ff0df6bcd30907c68944f3f9
-
SHA256
509675060738c04bac197d7914eb3ec90da8246910466f7597440e1fef194320
-
SHA512
6aa29983e223f8ad0be20762dc63497e124eb272237981d5a50f34b33cb9ec786f765615c9c45deedb638adc5b0ee8ebe35444373c90d01ca0bd73a04e614926
Score
10/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE 3392 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3392 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 900 3392 rundll32.exe 66 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3392 wrote to memory of 900 3392 EXCEL.EXE 71 PID 3392 wrote to memory of 900 3392 EXCEL.EXE 71 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Enumerates connected drives 3 TTPs
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.DOC.Kryptik.Q.10203.xls"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
PID:3392 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\WbMFNqE\DTXZRqG\fytiOXY.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:900
-